Online SHA1, SHA-256, SHA-384, SHA-512 Hash Calculator
Paste plain-text data into the below textarea or upload a file up to 10MB. Choose the mode and/or version and click the Calculate button. The resulting hashes will be shown in both hexadecimal and Base64 encoded format
If you encounter any errors with this tool attaching the file that causes problems.
You can create a handy link matching the current conversion operation (or the reverse equivalent if available).
Clicking the below buttons will generate the version that siutes you most and copy it to the clipboard.
The SHA hash functions are five cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. Hash algorithms compute a fixed-length digital representation (known as a message digest) of an input data sequence (the message) of any length.
They are called "secure" when:
- It is computationally infeasible to find a message that corresponds to a given message digest.
- It is computationally infeasible to find two different messages that produce the same message digest.
- Any change to a message (including single bit changes) will, with an exceedingly high probability, result in a completely different message digest.
The five algorithms are denoted SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512. The latter four variants are sometimes collectively referred to as SHA-2. SHA-1 produces a message digest that is 160 bits long; the number in the other four algorithms' names denote the bit length of the digest they produce.
SHA-1 is employed in several widely used security applications and protocols, including TLS and SSL, PGP, SSH, S/MIME, and IPsec. It was considered to be the successor to MD5, an earlier, widely-used hash function.
Implementations - Download source code
Please note that I did not write any of the bellow code. I have only gathered and mirrored all the implementations in one place. All license and legal notes have been untouched .
If you know of any other implementations (In any programming language not listed below let me know)